- The Strategist - https://aspistrategist.ru -
Cyber wrap
Posted By Zoe Hawkins on October 14, 2015 @ 13:30
Following up on last week’s cliffhanger [2], the Safe Harbour agreement was deemed invalid [3] by the European Court of Justice. For the last 15 years, this agreement has allowed the transfer [4] of EU data across the Atlantic by US businesses, based on corporate self-regulation. EU concerns over the US approach to data privacy were exacerbated [5] by the Snowden saga, and undoubtedly contributed to the recent decision. This verdict has potentially significant implications [6] for the more than 3,000 businesses in Europe and the US that depended on the agreement.
In the wake of last month’s historic agreement [7] on cyber security between the US and China, the Washington Post [8] reported this week that China has arrested several suspected hackers at the request of the US. The US identified the culprits as guilty of stealing [9] US commercial secrets and they were arrested by the Chinese two weeks before Xi Jinping’s visit to Washington DC. This move is a far cry from the normal denials; however it’s unclear [10] whether the arrests demonstrate a lasting policy change or simply a short-term strategy to avoid Obama’s threatened sanctions.
In a Clinton-esque move [11], new PM Malcolm Turnbull has come under fire [12] for sending official emails from a private server, separate to Parliamentary systems. Greens Senator Scott Ludlum has called for an audit of the server, and criticised the PM for making the role of Government cyber security experts more difficult. Commentators have drawn parallels between this scandal [13] and Hillary Clinton’s use of a private server [11] to handle classified information during her time as Secretary of State. Keenly aware of cyber security threats, Turnbull has denied his communication involved restricted information. The Parliamentary network has in the past been the subject of numerous attempts [14] by hackers to extract sensitive data from members and ministers.
The Internet of Things promises to change the way people interact with cyberspace. Harbor Research has produced a handy infographic [15] which illustrates the potential impact of the growing ubiquity of digital sensors in everyday items.
Cisco researchers have successfully disrupted [16] a group of cyber criminals operating the infamous Angler Exploit Kit. One of the most advanced ransomware [17] on the market, Angler EK restricts a user’s access to their system, often through encryption, demanding payment in exchange for data restoration. The investigators at the company’s Talos Security Unit noticed that the majority of Angler victims were connected to a Limestone Networks server and after a process of server examination [18] with the cooperation of Limestone it was discovered that the operation was exploiting up to 90,000 users every day. The exposed operation was responsible for up to half [19] of all Angler Exploit Kit activity and is estimated to have been generating up to US$30 million of revenue every year.
The recent spotlight [20] on automotive cybersecurity hasn’t gone unnoticed in Canada. The Canadian Government is making moves to secure its cars by offering a contract for the fortification of the electronic control units (ECUs) of government and military vehicles against cyber threats. A Tender Notice [21] titled ‘Cybersecurity of Automotive Systems’ was released last week, emphasising the ‘need to study the security of automotive vehicles, including understanding their vulnerabilities and assessing the potential mitigation measures’. Defence Research and Development Canada is offering [22] up to US$825,000 for the job.
The Great Firewall seems to still be up and running, with Apple News being blocked in China [23]. The new app, officially launched in the US and under testing in the UK and Australia, can be accessed around the world by travelling iPhone users, even in Hong Kong. However, when connecting from within mainland China, the app presents the message [24]: ‘Story Unavailable: News isn’t supported in your current region’. The source of the block is unclear, however it’s being suggested that Apple is self-censoring in order to comply with China’s restrictive media laws. China is Apple’s second largest consumer and made sales of over US$13 billion in the third quarter.
It’s been an interesting week for smartphone cyber hygiene. Apple has cleaned out [25] its iOS App store of several programs that were capable of disrupting the encrypted connections between servers and users. The nefarious apps install root certificates in smartphones, enabling the monitoring of personal data. Apple has urged its users [26] to delete these apps in order to protect their privacy, however has neglected to disclose the apps’ names, making this advice difficult to follow. In Washington, the White House has decided not to pursue [27] legislation that would force tech companies to install ‘backdoors [28]’ in their encryption software. The overruling of this law is seen as a victory [29] for privacy advocates; however this fight [30] between law enforcement imperatives and customer privacy has been going on since the mid-90s and is far from over.
Article printed from The Strategist: https://aspistrategist.ru
URL to article: /cyber-wrap-93/
URLs in this post:
[1] Image: https://aspistrategist.ru/wp-content/uploads/2015/10/4732700819_15933340a1_z.jpg
[2] last week’s cliffhanger: https://aspistrategist.ru/cyber-wrap-92/
[3] deemed invalid: http://thehill.com/policy/cybersecurity/256022-eu-high-court-invalidates-key-safe-harbor-data-pact
[4] allowed the transfer: http://arstechnica.com/tech-policy/2015/10/europes-highest-court-strikes-down-safe-harbour-data-sharing-between-eu-and-us/
[5] exacerbated: http://blogs.cfr.org/cyber/2015/10/07/the-implications-of-the-european-safe-harbor-decision/
[6] significant implications: http://www.usnews.com/news/articles/2015/10/05/rejecting-safe-harbor-law-threatens-us-and-eu-businesses
[7] historic agreement: http://www.wired.com/2015/09/us-china-reach-historic-agreement-economic-espionage/
[8] Washington Post: https://www.washingtonpost.com/world/national-security/in-a-first-chinese-hackers-are-arrested-at-the-behest-of-the-us-government/2015/10/09/0a7b0e46-6778-11e5-8325-a42b5a459b1e_story.html?postshare=6691444604558586
[9] guilty of stealing: http://www.bbc.com/news/technology-34504317
[10] it’s unclear: http://techcrunch.com/2015/10/09/is-china-coming-around-on-cybersecurity/
[11] Clinton-esque move: http://www.businessinsider.com.au/hillary-clinton-on-her-private-email-server-i-had-little-to-do-with-it-2015-9
[12] under fire: http://www.theaustralian.com.au/national-affairs/malcolm-turnbull-to-persist-with-private-email-server/story-fn59niix-1227564072481?sv=1dbab1f2e5942a177af16e73256ddc4e
[13] drawn parallels between this scandal: http://www.smh.com.au/technology/technology-news/questions-raised-over-malcolm-turnbulls-use-of-private-email-server-20151008-gk4vep.html
[14] numerous attempts: http://www.abc.net.au/news/2014-04-29/have-parliaments-computers-been-hacked/5419546
[15] infographic: http://harborresearch.com/are-you-prepared-for-big-changes-in-the-way-we-will-learn-work-and-innovate/
[16] successfully disrupted: http://talosintel.com/angler-exposed/
[17] ransomware: http://www.trendmicro.com/vinfo/us/security/definition/Ransomware
[18] process of server examination: http://arstechnica.com/security/2015/10/cisco-shuts-down-30-million-ransomware-operation/
[19] up to half: http://www.securityweek.com/cisco-disrupts-major-ransomware-operation-powered-angler-ek
[20] recent spotlight: http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
[21] Tender Notice: https://buyandsell.gc.ca/procurement-data/tender-notice/PW-QCL-018-16558
[22] offering: https://www.hackread.com/canadian-military-hiring-hackers/
[23] blocked in China: http://money.cnn.com/2015/10/12/technology/apple-news-blocked-china/
[24] the message: https://www.hongkongfp.com/2015/10/09/apple-automatically-self-censors-news-app-in-china/
[25] cleaned out: http://arstechnica.com/security/2015/10/apple-removes-several-apps-that-could-spy-on-encrypted-traffic/
[26] urged its users: https://support.apple.com/en-au/HT205347
[27] decided not to pursue: http://www.wired.com/2015/10/cops-dont-need-encryption-backdoor-to-hack-iphones/
[28] backdoors: http://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/backdoors-what-they-are-and-how-to-defend-networks-against-them
[29] seen as a victory: https://www.rt.com/usa/318159-Obama-wont-decrypt-data/
[30] this fight: http://www.informationweek.com/government/cybersecurity/obama-wont-force-encryption-backdoors-in-devices/a/d-id/1322610
Click here to print.
Copyright © 2024 The Strategist. All rights reserved.